{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T20:21:56Z","timestamp":1750537316227},"publisher-location":"New Delhi","reference-count":10,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226932"},{"type":"electronic","value":"9788132226956"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_9","type":"book-chapter","created":{"date-parts":[[2015,10,24]],"date-time":"2015-10-24T20:41:10Z","timestamp":1445719270000},"page":"97-105","source":"Crossref","is-referenced-by-count":4,"title":["Impact of Threshold to Identify Vocal Tract"],"prefix":"10.1007","author":[{"given":"Soumen","family":"Kanrar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"key":"9_CR1","unstructured":"Bimbot, F., et al.: A tutorial on text-independent speaker verification. EURASIP J. Appl. Signal Process. 4, 430\u2013451 (2004)"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"D Reynolds","year":"2000","unstructured":"Reynolds, D., Quatieri, T., Dunn, R.: Speaker verification using adapted Gaussian mixture models. Digit. Signal Proc. 10, 19\u201341 (2000)","journal-title":"Digit. Signal Proc."},{"key":"9_CR3","first-page":"681","volume":"1","author":"B Xiang","year":"2002","unstructured":"Xiang, B., et al.: Short-time gaussianization for robust speaker verification. Proc. ICASSP 1, 681\u2013684 (2002)","journal-title":"Proc. ICASSP"},{"issue":"2","key":"9_CR4","first-page":"173","volume":"8","author":"D Reynolds","year":"1995","unstructured":"Reynolds, D.: Automatic speaker recognition using Gaussian mixture speaker models. Linciln Lab. J. 8(2), 173\u2013191 (1995)","journal-title":"Linciln Lab. J."},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/0167-6393(95)00009-D","volume":"17","author":"D Reynolds","year":"1995","unstructured":"Reynolds, D.: Speaker identification and verification using Gaussian mixture speaker models. Speech Commun. 17, 91\u2013108 (1995)","journal-title":"Speech Commun."},{"key":"9_CR6","unstructured":"Auckenthaler, R., Carey, M., Lloyd-Thomas, H.: Score normalizing for text-independent speaker verification system. Digit. Signal Process. 10, 42\u201352 (2000)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Mirghafori, N., Heck, L.: An adaptive speaker verification system with speaker dependent a priori decision thresholds. In: Proceedings of the ICSLP, Denver Colorado (2002)","DOI":"10.21437\/ICSLP.2002-199"},{"issue":"3","key":"9_CR8","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.scijus.2011.03.002","volume":"51","author":"Geoffrey Stewart Morrison","year":"2011","unstructured":"Morrison, G.S.: Measuring the validity and reliability of forensic likelihood-ratio System. Sci Justice 5, 91\u201398 (2011). doi: 10.1016\/j.scijus.2011.03.002","journal-title":"Science & Justice"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Apsingeker, V.R., DeLeon, P.: Speaker model clustering for efficient speaker identification in large population applications. IEEE Trans. Audio Speech Language Process. 17(4), 848\u2013853(2009)","DOI":"10.1109\/TASL.2008.2010882"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-81-322-2250-7_3","volume-title":"Advances in Intelligent Systems and Computing","author":"Soumen Kanrar","year":"2015","unstructured":"Kanrar, S., et al.: Detect mimicry by enhancing the speaker recognition system. Adv. Intell. Syst. Comput. 339, 21\u201331 (2015). doi: 10.1007\/978-81-322-2250-7_3"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T12:10:38Z","timestamp":1692101438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}